Choose the items that an intruder would ignore when going through disposed garbage. Choose all
options that apply.
A.
Process lists.
B.
Boot sectors.
C.
Old passwords.
D.
Virtual memory.
E.
Network diagrams.
F.
IP (Internet Protocol) address lists.
Explanation:
When people create complex passwords that they can’t remember, or are in a situation where they
need multiple passwords they have a tendency of writing their passwords down, usually on a
notepad, a Post It note, or on their desk ledger.